From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Risk-Aware Cost-Optimal Resource Allocation for Cloud Applications., , , , и . SCC, стр. 210-214. IEEE, (2019)Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , и . ACM Trans. Cyber Phys. Syst., 3 (4): 36:1-36:21 (2019)Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation., , и . CoRR, (2018)GhostKnight: Breaching Data Integrity via Speculative Execution., , , и . CoRR, (2020)What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text., , , , и . IEEE Trans. Serv. Comput., 13 (3): 584-596 (2020)A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage., и . Data Sci. Eng., 1 (3): 149-160 (2016)DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping., , , и . DAC, стр. 1-6. IEEE, (2020)Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks., , , , , , и . CoRR, (2020)Exploiting Users' Rating Behaviour to Enhance the Robustness of Social Recommendation., , , , , и . WISE (2), том 10570 из Lecture Notes in Computer Science, стр. 467-475. Springer, (2017)A Verifiable Ranked Choice Internet Voting System., , , , , , и . WISE (2), том 10570 из Lecture Notes in Computer Science, стр. 490-501. Springer, (2017)